Login / Signup
FGIT-SecTech/DRBC
2010
2010
2010
Keyphrases
Publications
2010
Davrondzhon Gafurov
Emerging Biometric Modalities: Challenges and Opportunities.
FGIT-SecTech/DRBC
(2010)
Davrondzhon Gafurov
,
Patrick Bours
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor.
FGIT-SecTech/DRBC
(2010)
A. J. Clark
,
Patton Holliday
,
Robyn Chau
,
Harris Eisenberg
,
Melinda Chau
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010.
FGIT-SecTech/DRBC
(2010)
Pranab Kumar Dhar
,
Mohammad Ibrahim Khan
,
Cheol Hong Kim
,
Jong-Myon Kim
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection.
FGIT-SecTech/DRBC
(2010)
Kenji Yamamoto
,
Toshihiro Yamauchi
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.
FGIT-SecTech/DRBC
(2010)
Hsiang-Cheh Huang
,
Ting-Hsuan Wang
,
Wai-Chi Fang
Histogram-Based Reversible Data Hiding with Quadtree Concepts.
FGIT-SecTech/DRBC
(2010)
Rosslin John Robles
,
Haeng-Kon Kim
,
Tai-Hoon Kim
Internet SCADA Utilizing API's as Data Source.
FGIT-SecTech/DRBC
(2010)
Taehyoung Kim
,
Inhyuk Kim
,
Changwoo Min
,
Young Ik Eom
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology.
FGIT-SecTech/DRBC
(2010)
Chetana Hegde
,
H. Rahul Prabhu
,
D. S. Sagar
,
P. Deepa Shenoy
,
K. R. Venugopal
,
Lalit M. Patnaik
Human Authentication Based on ECG Waves Using Radon Transform.
FGIT-SecTech/DRBC
(2010)
Mushtaq Ahmad
Wireless Network Security Vulnerabilities and Concerns.
FGIT-SecTech/DRBC
(2010)
Wei-Chuen Yau
,
Raphael C.-W. Phan
,
Swee-Huay Heng
,
Bok-Min Goi
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
FGIT-SecTech/DRBC
(2010)
Maricel O. Balitanas
,
Tai-Hoon Kim
Insecure Information System's Solution Using Isolation Method.
FGIT-SecTech/DRBC
(2010)
Rosslin John Robles
,
Tai-Hoon Kim
Communication Security for Control Systems in Smart Grid.
FGIT-SecTech/DRBC
(2010)
Syed Irfan Nabi
,
Syed Waqar Nabi
,
Syed Awais Ahmed Tipu
,
Bushra Haqqi
,
Zahra Abid
,
Khaled Alghathbar
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan.
FGIT-SecTech/DRBC
(2010)
Raed Alosaimy
,
Khaled Alghathbar
,
Alaaeldin M. Hafez
,
Mohamed Hamdy Eldefrawy
NMACA Approach Used to Build a Secure Message Authentication Code.
FGIT-SecTech/DRBC
(2010)
Aneel Rahim
,
Fahad Bin Muhaya
Discovering the Botnet Detection Techniques.
FGIT-SecTech/DRBC
(2010)
Hong-bin Yim
,
Jae-Il Jung
Probabilistic Route Selection Algorithm for IP Traceback.
FGIT-SecTech/DRBC
(2010)
Dakshina Ranjan Kisku
,
Phalguni Gupta
,
Jamuna Kanta Sing
Fusion of Moving and Static Facial Features for Robust Face Recognition.
FGIT-SecTech/DRBC
(2010)
Zeeshan Shafi Khan
,
Khaled Alghathbar
,
Muhammad Sher
,
Khalid Rashid
Issues of Security and Network Load in Presence - A Survey.
FGIT-SecTech/DRBC
(2010)
Ju-Sung Kang
,
Okyeon Yi
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.
FGIT-SecTech/DRBC
(2010)
Wei Huang
,
Arthur Mynnet
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model.
FGIT-SecTech/DRBC
(2010)
Bo-heung Chung
,
Jung-nye Kim
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device.
FGIT-SecTech/DRBC
(2010)
Abdullah Sharaf Alghamdi
,
Syed Amanullah Quadri
,
Iftikhar Ahmad
,
Khalid Al-Nafjan
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.
FGIT-SecTech/DRBC
(2010)
Jemal H. Abawajy
,
Tai-Hoon Kim
Performance Analysis of Cyber Security Awareness Delivery Methods.
FGIT-SecTech/DRBC
(2010)
Muhammad Imran Razzak
,
Muhammad Khurram Khan
,
Khaled Alghathbar
Contactless Biometrics in Wireless Sensor Network: A Survey.
FGIT-SecTech/DRBC
(2010)
Toshihiro Yamauchi
,
Takayuki Hara
,
Hideo Taniguchi
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.
FGIT-SecTech/DRBC
(2010)
Hoon Ko
,
Zita A. Vale
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.
FGIT-SecTech/DRBC
(2010)
Mohamed Hamdy Eldefrawy
,
Muhammad Khurram Khan
,
Khaled Alghathbar
One-Time Password System with Infinite Nested Hash Chains.
FGIT-SecTech/DRBC
(2010)
Intae Kim
,
Keewook Rim
,
Junghyun Lee
Secure OSGi Platform against Service Injection.
FGIT-SecTech/DRBC
(2010)
Pranab Kumar Dhar
,
Cheol Hong Kim
,
Jong-Myon Kim
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model.
FGIT-SecTech/DRBC
(2010)
Bilal Khan
,
Khaled Alghathbar
,
Muhammad Khurram Khan
,
Abdullah M. AlKelabi
,
Abdulaziz Alajaji
Using Arabic CAPTCHA for Cyber Security.
FGIT-SecTech/DRBC
(2010)
Davrondzhon Gafurov
,
Patrick Bours
,
Bian Yang
,
Christoph Busch
Impact of Finger Type in Fingerprint Authentication.
FGIT-SecTech/DRBC
(2010)
Nagaraj Ambika
,
G. T. Raju
Figment Authentication Scheme in Wireless Sensor Network.
FGIT-SecTech/DRBC
(2010)
Syed Irfan Nabi
,
Abdulrahman A. Mirza
,
Khaled Alghathbar
Information Assurance in Saudi Organizations - An Empirical Study.
FGIT-SecTech/DRBC
(2010)
volume 122, 2010
Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
FGIT-SecTech/DRBC
122 (2010)